Just In
- 1 hr ago Best Noise-Cancelling Earbuds Under Rs 5,000: CMF Buds Pro, Redmi Buds 5, Realme Buds Air 5, and More
- 1 hr ago How to Get Zomato Gold Membership Worth Rs 999 for Free
- 3 hrs ago Garena Free Fire Max Redeem Codes for April 20, 2024: Get Access to the Latest In-game Loot
- 3 hrs ago Apple Watch X Renders Surface: Magnetic Bands, Blood Pressure Tracking, and More
Don't Miss
- Movies Love, Sex Aur Dhokha 2: The REAL Reason Of Rajkummar Rao And Nushrratt Bharuccha Not Being Part Of The Film
- Finance Gold Prices: 10-Gram 24-Carat Rises Rs 8,010 Before Falling; Chennai Gold Price At Rs 75,110
- Sports DC vs SRH My11Circle Prediction IPL 2024 Match 35: DEL vs HYD Fantasy Tips & Expert Picks
- News Punjab Human Rights Panel Issues Notice To ADGP In Sangrur Jail Clash Case
- Lifestyle Russian Influencer Starves His Newborn To Death With Sunlight Diet, Know Dos And Don’ts Of This Diet
- Education UPMSP Class 10 and 12 Results 2024 Released Today, Check the Details Here
- Automobiles Tesla CEO Elon Musk's Much-Awaited Visit to India Deferred, Leaving Questions Unanswered
- Travel Journey From Delhi To Ooty: Top Transport Options And Attractions
Facebook 16000 Users Credentials Slipped by PokerAgent Botnet
An analysis by a security firm ESET, noted that over 16,000 account credentials of Facebook was stolen by Poker Agent. The threat was primarily active in Israel, which was identified a year back. It was designed basically to steal the information regarding payment from the users of Facebook who played Zynga poker, the most played online poker game.
It was found that in March 2012 there were at least 800 computers that were affected and the database of the attacker contained over 16,000 credentials of Facebook accounts. The malware, from the moment it is on the device, logs on to the Facebook accounts using the credentials that were stolen. The malware then finds the stats of Zygna Poker and the payment information that is saved in the respective Facebook accounts of the users.
It is seen that the malware is coded in C# and this makes it easy to decompile. The Trojan is downloaded into a device using a downloader component that was available on the web. The victims appear to have been fooled into downloading the Trojan.
ESET had been tracking and monitoring Botnet since 2012 March. The malware for now does not seem to be spreading actively. The experts are unable to determine how it spread and its source but suspect a possibility of the same via Facebook. Cyber world criminals had stopped spreading the malware in February 2012 but the law enforcement and CERT officials of Israel have been notified. An investigation has now been launched. The social networking site, Facebook, in the mean time has implemented needed measures to curb such risks.
-
99,999
-
1,29,999
-
69,999
-
41,999
-
64,999
-
99,999
-
29,999
-
63,999
-
39,999
-
1,56,900
-
79,900
-
1,39,900
-
1,29,900
-
65,900
-
1,56,900
-
1,30,990
-
76,990
-
16,499
-
30,700
-
12,999
-
18,800
-
62,425
-
1,15,909
-
93,635
-
75,804
-
9,999
-
11,999
-
3,999
-
2,500
-
3,599